November 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Blog Stats
- 75,561 hits
Tag Archives: 2015
Happy Two-Factor Tuesday!!!
Check out some of my awesome posts on enabling Two-Factor What is Two-Factor? It’s something you know… like a password… and something you have, like an token generator or smartphone! That doesn’t mean have an easy to guess password though! You … Continue reading
Posted in Security Blog
Tagged 2015, cyber risk, NCSAM, passwords, risk, security, Security Awareness, two-factor
Comments Off on Happy Two-Factor Tuesday!!!
Scottrade Breach
“Cybercriminals had unauthorized access to our network for a period of several months between late 2013 and early 2014” According to a Cyber Security Alert page on Scottrade, Federal investigators found indicators that prove Scottrade’s network and systems was used. … Continue reading
Posted in Security Blog
Tagged 2013, 2014, 2015, breach, cybercrime, hacked, information security, phishing, Scottrade, social engineering
Comments Off on Scottrade Breach
National Cyber Security Awareness Month Weeks 1 & 2
I’m on a mission to increase my Continuing Professional Education (CPE) credits and what better way than promote National Cyber Security Awareness Month? Just like I’ve been posting, October is National Cyber Security Awareness Month. Here are two videos I’ve … Continue reading
Posted in Security Blog
Tagged #CyberAware, 2015, NCSAM, security, Security Awareness
Comments Off on National Cyber Security Awareness Month Weeks 1 & 2
Stop. Think. Connect. Tips Infographic!
Here’s an awesome infographic on Stop. Think. Connect. Which is a National Cyber Security Awareness initiative by the National Cyber Security Alliance and the U.S. Department of Homeland Security. Learn more here.
Posted in Security Blog
Tagged 2015, Information Technology Security Awareness, NCSAM, Security Awareness
Comments Off on Stop. Think. Connect. Tips Infographic!
Bypass Physical Security Using the Help of a Craigslist Job Ad
I spy, with my pi. A job ad was found on craigslist where some bad actors are hiring and paying up to $50/month to anyone who doesn’t adhere to their security policies and is willing to plug in a Raspberry … Continue reading
Posted in Security Blog
Tagged 2015, craigslist, hackers, Information Technology Security Awareness, Security Awareness, sniffing
Comments Off on Bypass Physical Security Using the Help of a Craigslist Job Ad
T-Mobile CEO Pissed Off at Experian
Hackers took T-Mobile customer names, addresses, Social Security numbers, birthdays, and even sensitive identification numbers from the servers owned and operated by Experian. Those FIFTEEN MILLION people whom applied for a regular T-Mobile USA postpaid plan between Sept. 1, 2013 and … Continue reading
Posted in Security Blog
Tagged 2015, breach, Experian, T-Mobile, third party
Comments Off on T-Mobile CEO Pissed Off at Experian
October is National Cyber Security Awareness Month!
National Cyber Security Awareness Month kicks off with STOP. THINK. CONNECT’s 5th Anniversary. Take a look at the week’s description and key messages. Also included are examples of how you can get involved, learn more and stay in touch. Also, … Continue reading
Posted in Security Blog
Tagged #CyberAware, 2015, cybersecurity, infographic, Information Technology Security Awareness, NCSAM, Security Awareness, STOP. THINK. CONNECT.
Comments Off on October is National Cyber Security Awareness Month!
Don’t Be a Victim of Tech Support Scams
This year alone, an estimated 3.3 million people in the United States will pay more than $1.5 billion to scammers. Attorney General Bob Ferguson and experts from Microsoft explain how scammers pretending to help you with computer problems can steal … Continue reading
Posted in Security Blog
Tagged 2015, scam, scammers, scamming, Security Awareness, social engineering, vishing
Comments Off on Don’t Be a Victim of Tech Support Scams
19 Laws of Information Security
Law #1: If a bad guy can persuade you to run his program on your computer, it’s not solely your computer anymore. Law #2: Nobody believes anything bad can happen to them, until it does. Law #3: If a bad … Continue reading
Posted in Security Blog
Tagged 2015, Immutable Laws, information security, Information Technology Security Awareness, Security Awareness
Comments Off on 19 Laws of Information Security
Volkswagen Hack
In the traditional meaning of the word hack, there are some half-million diesel powered Volkswagens out that have the capability to detect when they are hooked up to an emissions computer and switch modes to ‘burn clean’, which are normally … Continue reading